期刊文献+

基于单向函数动态安全的组播密钥分配方案 被引量:1

New Multicast Key Distribution Scheme Satisfying Dynamic Security Based on One-way Function
在线阅读 下载PDF
导出
摘要 提出了一种基于单向函数的满足动态安全性的组播密钥分配方案,比较了其与OFT方案的不同特点,使用该方案在组成员加入或退出时只需更改节点公开信息,减少了密钥更新所需的广播消息量,结果表明,该方案具有较高的可行性。 This article gives a new multicast key distribution scheme satisfying dynamic security based on one-way function. Using this scheme the key distribution tree needs only changing a few of its key nodes public announcing information when group members join or leave the group. Thus this scheme improves the rekeying efficiency of the key distribution tree. Furthermore, this article compares this scheme with OFT scheme, the results show this scheme is practical.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第4期158-159,177,共3页 Computer Engineering
基金 武警部队院校军事科研项目
关键词 组播密钥分配 动态安全性 单向函数 OFT方案 Multicast key distribution Dynamic security One-way function OFT scheme
  • 相关文献

参考文献5

二级参考文献23

  • 1[1]Ateniese G, Chevassut D, Hasse D et al. The design of a group key agreement API. In: Proc DARPA Information Survivability Conference and Exposition, SC, USA, 2000. 115-126
  • 2[2]Caronni G, Waldvogel M, Sun D et al. Efficient security for large and dynamic groups. In: Proc the 7th Workshop on Enabling Technologies, (WET ICE'98), Stanford, California, USA,1998. 376-383. http://www.computer.org/ proceedings/wetice/8751/8751toc.htm
  • 3[3]Lakshminath R, Mukherjee S, Sama A. A dual encryption protocol for scalable secure multicasting. In: Proc the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 2-8
  • 4[4]Gong L, Shacham N. Elements of trusted multicasting. In: Proc IEEE International Conference on Network Protocols, Boston, MA, USA, 1994. 23-30
  • 5[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1997
  • 6[6]Blundo C, Santis A D, Herzberg A et al. Perfectly-secure key distribution for dynamic conferences. In: Proc CRYPTO'92, California, USA, 1992. 471-486
  • 7[7]Mayer A, Yung M. Generalized secret sharing and group-key distribution using short keys. In: Proc Compression and Complexity of Sequences 1997, Salerno, Italy, 1998. 30-44
  • 8[8]Chiou G H, Chen W T. Secure broadcasting using the secure lock. IEEE Trans Software Engineering, 1989,15(8): 929-934
  • 9[9]Ballardie T. Scalable Multicast Key Distribution. RFC 1949, 1996
  • 10[10]Dinsmore P T, Balenson D M, Heyman M et al. Policy-based security management for large dynamic groups: An overview of the DCCM project. In: Proc the DARPA Information Survivability Conference & Exposition, SC, USA, 2000. 64-73

共引文献53

同被引文献7

  • 1黄鑫阳,杨明.无线传感器网络密钥管理研究综述[J].计算机应用研究,2007,24(3):10-15. 被引量:19
  • 2工业无线网络WIA规范[S].ICS25.040.
  • 3Li L, Wang R C, Jiang B, et al. Research of layer-duster key management scheme on wireless sensor networks [J].Journal of Electronics&Information Technology, 2006, 28 (12) : 2394- 2397.
  • 4Eschenauer L, Gligor V D. A key management scheme for distributed sensor networks [A]. Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington, DC, USA. 2002: 41-47.
  • 5Chuang Pojen, Chao Tunhao, Li Boyi. A scalable grouping random key pre - distribution scheme for large scale distributed sensor networks [A]. Proceeding of the 3rd International Conference on Information Technology and Applications [C]. [S1]: [Sn], 2005.
  • 6朱政坚,谭庆平,朱培栋.无线传感器网络安全研究综述[J].计算机工程与科学,2008,30(4):101-105. 被引量:22
  • 7田丰,王交峰,王传云,潘琢金,孙小平.无线传感器网络随机密钥预分配改进方案[J].计算机应用,2008,28(6):1388-1391. 被引量:3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部